Sciweavers

1663 search results - page 8 / 333
» Computer Security in the Real World
Sort
View
SIGCSE
2008
ACM
144views Education» more  SIGCSE 2008»
13 years 7 months ago
Geographic information systems: real world applications for computer science
: This paper discusses the development and delivery of an upper level computer science elective course in geographic information systems (GIS). GIS applications span numerous and d...
Wendy Zhang, Theresa Beaubouef
MEDES
2010
ACM
13 years 2 months ago
UBI-hotspots: sustainable ecosystem infrastructure for real world urban computing research and business
We report a novel deployment of so-called UBI-hotspots in a city center to establish an ecosystem infrastructure for conducting diverse urban computing research and business in au...
Timo Ojala, V. Valkama, Hannu Kukka, Tommi Heikkin...
JERIC
2008
67views more  JERIC 2008»
13 years 7 months ago
An HCI Approach to Computing in the Real World
Sarita Yardi, Pamela Krolikowski, Taneshia Marshal...
EUROPKI
2009
Springer
13 years 5 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
RT
1999
Springer
13 years 11 months ago
Real-Time Rendering of Real World Environments
: One of the most important goals of interactive computer graphics is to allow a user to freely walk around a virtual recreation of a real environment that looks as real as the wor...
David K. McAllister, Lars S. Nyland, Voicu Popescu...